Nowadays, mobile phones have already become an indispensable part of our lives. We communicate on mobile phones, make friends on mobile phones, work on mobile phones, and entertain on mobile phones. No wonder some people say that what the average person touches the most is definitely not his wife's hand, but his beloved mobile phone. Indeed, mobile phones have evolved from bricks to straight-plate buttons, flip covers, screw covers, and slide-up phones; screens have grown from thumb-sized to 2-inch, 2.5-inch, and 4-inch, with large screens becoming the trend and mainstream. Applications have evolved from simple voice calls to supporting the sending of Chinese text messages, to supporting the sending and receiving of MMS messages, enabling mobile phones to browse text-only web pages, and sending and receiving emails. Additional functions have evolved from being blank to built-in games such as Snake, to the addition of cameras, and then to becoming music phones, adding Bluetooth functions, alarm clock functions, and a series of other added values. It has to be said that today's mobile phones are becoming more and more powerful and more convenient. But as smartphones become more and more convenient, the hidden dangers behind them are also beginning to emerge. Personal information leakage, malware, super SMS viruses, winning SMS, bank card fraud, stealing data traffic and other problems are emerging in an endless stream, making people worried and even fearful. Understanding the drawbacks and how to prevent them has become a topic that every smartphone user must face. Xiao Ma Ge's magical fable 6 years ago has come true When I went to my friend's house on Sunday, he told me something. He said that a thief was caught in a daily necessities store downstairs a few days ago. He secretly replaced the store's payment QR code with his own. Due to the owner's negligence, he didn't find out until the end of the month when settling the payment. But according to the thief's account, he had quietly collected 130,000 yuan at home through this store this month. Although this news has not been exposed until today, we can see that while we use the convenient QR code payment, it also brings many intuitive security risks. This reminds me of what Ma Huateng said on Weibo 6 years ago: security and convenience are always relatively contradictory! At that time, when Tencent Weibo was at its peak, this sentence attracted many comments from industry insiders, but most people believed that with the development of technology and the upgrading of fingerprint, face recognition and other technologies, the future Internet will be more convenient and safer. Time flies, and 6 years have passed in a flash. Even though various types of payment methods are emerging, the current network environment is not safer than before. This just verifies what Pony Ma said 6 years ago, that security and convenience are always contradictory. Even with the rapid development of technology, this law is almost impossible to break, and there is almost no solution that is both safe and convenient. Convenience and safety are always contradictory. According to data from last year's "my country Public Cybersecurity Awareness Survey Report", about 83% of netizens in my country have security risks in online payments, and the proportion of using the same password for multiple accounts is as high as 75.93%; the proportion of randomly connecting to public free WiFi is as high as 80.21%; and the proportion of respondents who do not carefully identify the authenticity of the payment page URL when making payments is close to 35%. Some people always say that the emergence of NFC can solve the problem of convenience and security, but this is not true. The convenience of NFC allows our users to bind bank cards for shopping and swipe bus cards without passwords and cumbersome procedures, which is much more convenient. It also makes it much easier for hackers to steal our data and information. As long as hackers open free hotspots with iconic landmarks as their names, they will inevitably attract many people to connect. In this way, hackers can implant Trojans at will to leak the information of many people, and even the bound mobile phones may become ATMs for hackers. Similarly, the extremely popular fingerprint payment can also give hackers an opportunity to take advantage. At present, many hackers can bypass the fingerprint reader to unlock and pay, and they can even copy the user's fingerprint in the phone, which will greatly threaten the user's safety. Fingerprints are different from passwords. If a password is stolen, it can be changed, but it is very difficult to change a stolen fingerprint. It is worth mentioning that fingerprint recognition is also affected by factors such as injuries, temperature and humidity. Data from the Ministry of Public Security also shows that the fingerprints of about 3% of people cannot be well recognized. The same is true for face recognition. Face recognition is a biometric-based recognition method. Compared with traditional recognition methods such as fingerprint recognition, it is real-time, accurate, highly precise, easy to use, highly stable, difficult to counterfeit, cost-effective, and non-intrusive. However, many movies have shown us that it is easy to break through the inherent rules of face recognition through high-tech and even 3D printing, holographic projection and other technologies, which brings more terrible security risks. Moreover, once face recognition is widely used, it will be very difficult to modify it once it is broken, just like fingerprint payment. Self-destructing mobile phone finally developed successfully But the more unsafe and embarrassing the situation is, the more research and development of a mobile phone self-destruct function was born. Recently, a new type of polymer developed by researchers at King Abdullah University of Science and Technology in Saudi Arabia is much more convenient. It is not only compatible with most common semiconductors, but can also completely self-destruct in as fast as 10 seconds. According to researchers, this self-destruction mechanism is mainly based on an expandable polymer layer. When heated to 80 degrees Celsius, its volume will quickly expand to 7 times its original size, and the triggering process can be carried out by heating the electrode. It is reported that only 500 to 600mW of electricity is released to expand and destroy parts within 10 to 15 seconds. Since the whole process is just to tear and destroy parts through tension, it is much safer than explosion. Self-destruction is good, but its safety is questionable Although this self-destruction function perfectly solves the problem that safety and convenience cannot exist at the same time, it brings personal safety issues this time. Since the principle is that the processor is destroyed by heating and expansion, what if you operate it by mistake? What if you hurt a thief? In addition, once the mobile phone has this device, you can't get on the train or plane at all. Although the official statement is that the mobile phone will not exceed the specified safety range when it self-destructs and hurt innocent people. But just hurting yourself or the thief is a very serious problem. Not only that, once it is widely used, the second-hand mobile phone trading market in the future will face the tragic situation of closing down, because there is a group of people in China who only care about whether you can use it as long as I sell it and get the money. Anyway, there is no problem in the transaction. In short, no matter what time it is, security and convenience are always inversely proportional. If you want to enjoy a safe environment, you should make yourself "inconvenient" first. Perhaps the original intention of this technology is to provide people with a safer and more convenient mobile phone use environment, but at present, it is not completely convincing enough. As a winner of Toutiao's Qingyun Plan and Baijiahao's Bai+ Plan, the 2019 Baidu Digital Author of the Year, the Baijiahao's Most Popular Author in the Technology Field, the 2019 Sogou Technology and Culture Author, and the 2021 Baijiahao Quarterly Influential Creator, he has won many awards, including the 2013 Sohu Best Industry Media Person, the 2015 China New Media Entrepreneurship Competition Beijing Third Place, the 2015 Guangmang Experience Award, the 2015 China New Media Entrepreneurship Competition Finals Third Place, and the 2018 Baidu Dynamic Annual Powerful Celebrity. |
>>: ZF and Hella reach strategic cooperation to pave the way for autonomous driving
In temperate zones, or in low-latitude areas, in ...
This article was reviewed by Liu Shaowei, Deputy ...
The progress of science and technology has brough...
The company was founded in 2010 and developed a d...
Japan's Panasonic Corp. President Kazuhiro Ts...
It is the golden season of "being sucked blo...
Product data reporting is an essential task for p...
According to the "2020 China Fast Moving Con...
Whether operators say "free phone purchase&q...
After the fatal accident involving NIO's NOP,...
This article is reproduced from Leiphone.com. If ...
Welfare is coming! You can make money by scanning...
WeChat Mini Program is an application that users ...
The explosive growth of new energy vehicles and p...